0845 2606 303

Controls access to portable storage media like USB memory sticks, SD cards (used by digital cameras) and more

USB sticks are one of the main threats as they are small, easily hidden and can store up to 4 GB of data. GFI EndPointSecurity recognizes USB storage sticks in addition to any device that can be mounted as a hard disk (whether accessed via USB, FireWire, etc.). For example, plugging a digital camera into a USB port gives users access to storage on an SD card; SD cards are available in several sizes including 2 GB and over.

Controls access to CDs and floppies

You can centrally disable users from accessing CD/DVD drives as well as from reading or writing data to and from floppy disks. This way, you can block normal users from bringing in data that could be harmful to your network, such as viruses, trojans and other malware. Although you can switch off CD and/or floppy access from the BIOS, in reality this solution is impractical: You would have to physically visit the machine to temporarily switch off protection and install software. In addition, advanced users can hack the BIOS.

Protect your network against the threats posed by non-removable media devices

GFI EndPointSecurity protects your network against non-removable media devices by allowing you to lock down a machine to a specific hardware level, guaranteeing protection against Bluetooth devices, network cards and more.

Easily configure group-based protection control via Active Directory

You can configure and categorize computers into different protection groups: For each group you may specify different levels of protection and devices to allow or disallow access to. You can also leverage the power of groups and make an entire department a member of the group and easily change the settings for the entire group. Configuration of GFI EndPointSecurity is effortless and leverages the power of Active Directory and does not require the administrator to remember and keep track of which policies were deployed to which computers. Other storage control software requires cumbersome per-machine administration, forcing you to make the changes on a per-machine basis and update the configuration on each machine before the settings can take effect.

Granular access control

GFI EndPointSecurity enables you to allow or deny access to a device as well as to assign read only or full access privileges (where applicable) over every supported device (such as PDAs) on a user by user basis.

Log device-related user activity

With GFI EndPointSecurity you can log device-related user activity to both the event log and a central SQL Server. A list of files accessed to/from the device is recorded whenever users plug in devices both successfully and unsuccessfully.

Includes remote deployment tool

The GFI EndPointSecurity remote deployment tool can deploy the agent network-wide in a few minutes. You can configure to deploy domain-wide, per computer or to a list of computers.

Centralized control facilitates temporary access

Because you can easily add/remove a user to a group in Active Directory, it is simple to grant temporary access to a removable media, floppy or CD. Temporary access may be occasionally required, but should not mean that you cannot control access the rest of the time.

Other features:

  • Support for operating systems in any Unicode-compliant language

You're in good company...

Many leading companies have chosen GFI EndPointSecurity. Here are just a few: Best Western Sterling Inn, Fair Trades Ltd, Central Highlands Water, Aurum Funds and many more.

System requirements
 

Windows 2000/2003 or Windows XP Pro.

 

Brochure/Data Sheet
Take a closer look at GFI EndPoint Security!
Pricing
Check out our competitive pricing!
Download your FREE trial!
Get your FREE eval version of GFI EndPoint Security
Features
Find out more about GFI EndPoint Security!
Read what others have to say about GFI EndPoint Security!
EMAIL: info@kobinetworks.com TEL: 0845 2606 303 FAX: 0208 7555 882
ADDRESS: Legacy Centre, Hampton Road West, Feltham, Middlesex TW13 6DH
© Kobi Network Management
Terms of Use | Privacy Policy | Site by Skymarket